[Tool] RE-Architect: Automated binary analysis with multiple decompilers + AI explanations
github.comยท2dยท
Discuss: r/programming
๐Ÿ”ฌStatic Analysis
Flag this post
The Best Smart Water-Leak Detector
nytimes.comยท9h
๐Ÿ”’Security
Flag this post
Internship Technical Interview Advice
reddit.comยท8hยท
Discuss: r/embedded
๐ŸŒBrowser Exploitation
Flag this post
I reverse engineered my cheap managed switch's firmware
xda-developers.comยท1d
๐ŸŒBrowser Exploitation
Flag this post
Screening Without Tagging
science.orgยท9h
๐Ÿ›Fuzzing
Flag this post
Reversing at Scale: AI-Powered Malware Detection for Appleโ€™s Binaries
blog.virustotal.comยท7hยท
๐Ÿ’ฅExploit Development
Flag this post
Using Coding Agents to Decompile Nintendo 64 Games
blog.chrislewis.auยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
A Deep Dive into the Morris Worm
rapid7.comยท22hยท
Discuss: Hacker News
๐Ÿ’ฅExploit Development
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.comยท1h
๐ŸŒBrowser Exploitation
Flag this post
An introduction to program synthesis (Part II) - Automatically generating features for machine learning
mchav.github.ioยท1dยท
Discuss: r/programming
๐Ÿ”ฌStatic Analysis
Flag this post
Announcing Magika 1.0: now faster, smarter, and rebuilt in Rust
blogger.comยท8h
๐Ÿฆ€Rust
Flag this post
Peeling Back the Plastic: Finding 0-Days in IoT Devices
bishopfox.comยท14h
๐ŸŒBrowser Exploitation
Flag this post
Puran File Recovery Portable 2.0
majorgeeks.comยท14h
๐ŸŒBrowser Exploitation
Flag this post
Day 26: The Dead Letter Queue Pattern
javatsc.substack.comยท1hยท
Discuss: r/programming
๐Ÿ’ฅExploit Development
Flag this post
A Guide to the Best Java Machine Learning Libraries
dev.toยท17hยท
Discuss: DEV
๐Ÿ”ฌStatic Analysis
Flag this post
Evaluating digital forensic findings in Trojan horse defense cases using Bayesian networks
sciencedirect.comยท18h
๐Ÿ’ฅExploit Development
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.ioยท1dยท
๐Ÿ’ฅExploit Development
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.comยท3d
๐ŸŒBrowser Exploitation
Flag this post
Louvre Jewel Heist Reveals Decades of Cybersecurity Failures
windowsforum.comยท21h
๐Ÿ”’Security
Flag this post